Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Intelligent Automation with VMware

You're reading from   Intelligent Automation with VMware Apply machine learning techniques to VMware virtualization and networking

Arrow left icon
Product type Paperback
Published in Mar 2019
Publisher Packt
ISBN-13 9781789802160
Length 344 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ajit Pratap Kundan Ajit Pratap Kundan
Author Profile Icon Ajit Pratap Kundan
Ajit Pratap Kundan
Arrow right icon
View More author details
Toc

Table of Contents (19) Chapters Close

Preface Section 1: VMware Approach with ML Technology FREE CHAPTER
Machine Learning Capabilities with vSphere 6.7 Proactive Measures with vSAN Advanced Analytics Security with Workspace ONE Intelligence Proactive Operations with VMware vRealize Suite Intent-Based Manifest with AppDefense Section 2: ML Use Cases with VMware Solutions
ML-Based Intelligent Log Management ML as a Service in the Cloud ML-Based Rule Engine with Skyline DevOps with vRealize Code Stream Transforming VMware IT Operations Using ML Section 3: Dealing with Big Data, HPC , IoT, and Coud Application Scalability through ML
Network Transformation with IoT Virtualizing Big Data on vSphere Cloud Application Scaling High-Performance Computing Other Books You May Enjoy

VMware vReaIize Network Insight

VMware vRealize Network Insight provides customers intelligent operations for software-defined networking and security. It helps customers to build an efficient, always-on, and secure network infrastructure across different cloud infrastructures. We can plan, design, and deploy micro-segmentation to have visibility across virtual and physical networks. It is very useful in managing VMware NSX deployments and is available as a service offering as VMware Network Insight. vRNI polls third-party devices periodically (between 5 and 10 minutes on average) on a read-only basis. The protocols used include Secure Shell (SSH), Simple Network Management Protocol (SNMP), and Representational State Transfer (REST).

vRNI administrators must configure the vRNI data source interfaces with the read-only credentials that have been predefined on these...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime